linuxnoob123
(usa Kali)
Enviado em 23/03/2021 - 14:47h
Starting Nmap 7.70 (
https://nmap.org ) at 2021-03-23 17:01 UTC
Pre-scan script results:
| broadcast-avahi-dos:
| Discovered hosts:
| 224.0.0.251
| After NULL UDP avahi packet DoS (CVE-2011-1002).
|_ Hosts are all up (not vulnerable).
Nmap scan report for
Host is up (0.15s latency).
rDNS record for : br598-ip03.hostgator.com.br
Not shown: 984 closed ports
PORT STATE SERVICE VERSION
21/tcp open ftp Pure-FTPd
| ssl-dh-params:
| VULNERABLE:
| Anonymous Diffie-Hellman Key Exchange MitM Vulnerability
| State: VULNERABLE
| Transport Layer Security (TLS) services that use anonymous
| Diffie-Hellman key exchange only provide protection against passive
| eavesdropping, and are vulnerable to active man-in-the-middle attacks
| which could completely compromise the confidentiality and integrity
| of any data exchanged over the resulting session.
| Check results:
| ANONYMOUS DH GROUP 1
| Cipher Suite: TLS_DH_anon_WITH_AES_256_GCM_SHA384
| Modulus Type: Safe prime
| Modulus Source: Unknown/Custom-generated
| Modulus Length: 3072
| Generator Length: 8
| Public Key Length: 3072